Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-libs/webkit-gtk@2.48.5
Typeebuild
Namespacenet-libs
Namewebkit-gtk
Version2.48.5
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.38.00
Latest_non_vulnerable_version4.38.00
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1vsk-e1mf-6uaz
vulnerability_id VCID-1vsk-e1mf-6uaz
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43216
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28385
published_at 2026-04-02T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29857
published_at 2026-04-13T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.30035
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29849
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29912
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29948
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29953
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29906
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386273
reference_id 2386273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386273
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-43216
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vsk-e1mf-6uaz
1
url VCID-1xcs-fpk3-nyg4
vulnerability_id VCID-1xcs-fpk3-nyg4
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44187
reference_id
reference_type
scores
0
value 0.00539
scoring_system epss
scoring_elements 0.67584
published_at 2026-04-13T12:55:00Z
1
value 0.00539
scoring_system epss
scoring_elements 0.67543
published_at 2026-04-02T12:55:00Z
2
value 0.00539
scoring_system epss
scoring_elements 0.67564
published_at 2026-04-04T12:55:00Z
3
value 0.00539
scoring_system epss
scoring_elements 0.67542
published_at 2026-04-07T12:55:00Z
4
value 0.00539
scoring_system epss
scoring_elements 0.67594
published_at 2026-04-08T12:55:00Z
5
value 0.00539
scoring_system epss
scoring_elements 0.67607
published_at 2026-04-09T12:55:00Z
6
value 0.00539
scoring_system epss
scoring_elements 0.6763
published_at 2026-04-11T12:55:00Z
7
value 0.00539
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314706
reference_id 2314706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314706
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/7079-1/
reference_id USN-7079-1
reference_type
scores
url https://usn.ubuntu.com/7079-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2024-44187
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xcs-fpk3-nyg4
2
url VCID-2nmg-6jk2-ebcb
vulnerability_id VCID-2nmg-6jk2-ebcb
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44296
reference_id
reference_type
scores
0
value 0.00664
scoring_system epss
scoring_elements 0.71183
published_at 2026-04-13T12:55:00Z
1
value 0.00664
scoring_system epss
scoring_elements 0.71143
published_at 2026-04-02T12:55:00Z
2
value 0.00664
scoring_system epss
scoring_elements 0.71161
published_at 2026-04-04T12:55:00Z
3
value 0.00664
scoring_system epss
scoring_elements 0.71136
published_at 2026-04-07T12:55:00Z
4
value 0.00664
scoring_system epss
scoring_elements 0.71178
published_at 2026-04-08T12:55:00Z
5
value 0.00664
scoring_system epss
scoring_elements 0.71191
published_at 2026-04-09T12:55:00Z
6
value 0.00664
scoring_system epss
scoring_elements 0.71214
published_at 2026-04-11T12:55:00Z
7
value 0.00664
scoring_system epss
scoring_elements 0.712
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44296
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121563
reference_id 121563
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121563
5
reference_url https://support.apple.com/en-us/121564
reference_id 121564
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121564
6
reference_url https://support.apple.com/en-us/121565
reference_id 121565
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121565
7
reference_url https://support.apple.com/en-us/121566
reference_id 121566
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121566
8
reference_url https://support.apple.com/en-us/121567
reference_id 121567
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121567
9
reference_url https://support.apple.com/en-us/121569
reference_id 121569
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121569
10
reference_url https://support.apple.com/en-us/121571
reference_id 121571
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121571
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323289
reference_id 2323289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323289
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2024:9545
reference_id RHSA-2024:9545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9545
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/7113-1/
reference_id USN-7113-1
reference_type
scores
url https://usn.ubuntu.com/7113-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2024-44296
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2nmg-6jk2-ebcb
3
url VCID-2rm2-f5xj-1bb2
vulnerability_id VCID-2rm2-f5xj-1bb2
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24208
reference_id
reference_type
scores
0
value 0.00315
scoring_system epss
scoring_elements 0.54584
published_at 2026-04-02T12:55:00Z
1
value 0.00315
scoring_system epss
scoring_elements 0.54598
published_at 2026-04-13T12:55:00Z
2
value 0.00315
scoring_system epss
scoring_elements 0.54577
published_at 2026-04-07T12:55:00Z
3
value 0.00315
scoring_system epss
scoring_elements 0.54629
published_at 2026-04-08T12:55:00Z
4
value 0.00315
scoring_system epss
scoring_elements 0.54623
published_at 2026-04-09T12:55:00Z
5
value 0.00315
scoring_system epss
scoring_elements 0.54636
published_at 2026-04-11T12:55:00Z
6
value 0.00315
scoring_system epss
scoring_elements 0.54619
published_at 2026-04-12T12:55:00Z
7
value 0.00315
scoring_system epss
scoring_elements 0.54608
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/
url https://support.apple.com/en-us/122379
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357910
reference_id 2357910
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357910
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
10
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
11
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
12
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
13
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
14
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
15
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
16
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
17
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
18
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
19
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-24208
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2rm2-f5xj-1bb2
4
url VCID-3daw-8nh6-dfcq
vulnerability_id VCID-3daw-8nh6-dfcq
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44185
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.1148
published_at 2026-04-13T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11549
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11603
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11392
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11476
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11535
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11545
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11511
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120909
5
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120911
6
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120913
7
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120914
8
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120915
9
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120916
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323263
reference_id 2323263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323263
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2024:9637
reference_id RHSA-2024:9637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9637
16
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2024-44185
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3daw-8nh6-dfcq
5
url VCID-3k6e-zz11-93bn
vulnerability_id VCID-3k6e-zz11-93bn
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31273
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26463
published_at 2026-04-02T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.2833
published_at 2026-04-13T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28524
published_at 2026-04-04T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28318
published_at 2026-04-07T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28384
published_at 2026-04-08T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28427
published_at 2026-04-09T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28431
published_at 2026-04-11T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28387
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31273
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386268
reference_id 2386268
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386268
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-31273
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3k6e-zz11-93bn
6
url VCID-5q44-vqhn-zydx
vulnerability_id VCID-5q44-vqhn-zydx
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43212
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24845
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-13T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26334
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26106
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26173
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26221
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26229
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26184
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386271
reference_id 2386271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386271
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-43212
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q44-vqhn-zydx
7
url VCID-7gyr-mvmk-pfh9
vulnerability_id VCID-7gyr-mvmk-pfh9
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54467
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40598
published_at 2026-04-08T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40626
published_at 2026-04-11T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40607
published_at 2026-04-09T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40547
published_at 2026-04-07T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40625
published_at 2026-04-04T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43206
published_at 2026-04-13T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43221
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353872
reference_id 2353872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353872
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
20
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
21
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
22
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
23
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2024-54467
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gyr-mvmk-pfh9
8
url VCID-azef-hxum-z3eb
vulnerability_id VCID-azef-hxum-z3eb
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23755
published_at 2026-04-04T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23536
published_at 2026-04-07T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24888
published_at 2026-04-13T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-08T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24969
published_at 2026-04-09T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-11T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24943
published_at 2026-04-12T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27125
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122281
reference_id 122281
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122281
5
reference_url https://support.apple.com/en-us/122283
reference_id 122283
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122283
6
reference_url https://support.apple.com/en-us/122284
reference_id 122284
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122284
7
reference_url https://support.apple.com/en-us/122285
reference_id 122285
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122285
8
reference_url https://support.apple.com/en-us/122345
reference_id 122345
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122345
9
reference_url https://support.apple.com/en-us/122346
reference_id 122346
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122346
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122372
11
reference_url https://support.apple.com/en-us/122376
reference_id 122376
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122376
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
reference_id 2351802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
13
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://access.redhat.com/errata/RHSA-2025:2863
reference_id RHSA-2025:2863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2863
16
reference_url https://access.redhat.com/errata/RHSA-2025:2864
reference_id RHSA-2025:2864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2864
17
reference_url https://access.redhat.com/errata/RHSA-2025:2997
reference_id RHSA-2025:2997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2997
18
reference_url https://access.redhat.com/errata/RHSA-2025:2998
reference_id RHSA-2025:2998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2998
19
reference_url https://access.redhat.com/errata/RHSA-2025:3000
reference_id RHSA-2025:3000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3000
20
reference_url https://access.redhat.com/errata/RHSA-2025:3001
reference_id RHSA-2025:3001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3001
21
reference_url https://access.redhat.com/errata/RHSA-2025:3002
reference_id RHSA-2025:3002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3002
22
reference_url https://access.redhat.com/errata/RHSA-2025:3005
reference_id RHSA-2025:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3005
23
reference_url https://access.redhat.com/errata/RHSA-2025:3034
reference_id RHSA-2025:3034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3034
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-24201
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azef-hxum-z3eb
9
url VCID-bkcz-d48v-7uca
vulnerability_id VCID-bkcz-d48v-7uca
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24213
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31973
published_at 2026-04-02T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31846
published_at 2026-04-13T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.32016
published_at 2026-04-04T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31836
published_at 2026-04-07T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31888
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31916
published_at 2026-04-09T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31921
published_at 2026-04-11T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31881
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357913
reference_id 2357913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357913
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-24213
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcz-d48v-7uca
10
url VCID-cmdy-ztbw-jffq
vulnerability_id VCID-cmdy-ztbw-jffq
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54551
reference_id
reference_type
scores
0
value 0.00504
scoring_system epss
scoring_elements 0.66155
published_at 2026-04-13T12:55:00Z
1
value 0.00504
scoring_system epss
scoring_elements 0.66123
published_at 2026-04-02T12:55:00Z
2
value 0.00504
scoring_system epss
scoring_elements 0.6615
published_at 2026-04-04T12:55:00Z
3
value 0.00504
scoring_system epss
scoring_elements 0.66118
published_at 2026-04-07T12:55:00Z
4
value 0.00504
scoring_system epss
scoring_elements 0.66167
published_at 2026-04-08T12:55:00Z
5
value 0.00504
scoring_system epss
scoring_elements 0.6618
published_at 2026-04-09T12:55:00Z
6
value 0.00504
scoring_system epss
scoring_elements 0.66199
published_at 2026-04-11T12:55:00Z
7
value 0.00504
scoring_system epss
scoring_elements 0.66186
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120909
5
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120911
6
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120913
7
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120914
8
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120915
9
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120916
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357909
reference_id 2357909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357909
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
20
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
21
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
22
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
23
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2024-54551
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmdy-ztbw-jffq
11
url VCID-cw56-pdyr-fbge
vulnerability_id VCID-cw56-pdyr-fbge
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24216
reference_id
reference_type
scores
0
value 0.00821
scoring_system epss
scoring_elements 0.74363
published_at 2026-04-02T12:55:00Z
1
value 0.00821
scoring_system epss
scoring_elements 0.74405
published_at 2026-04-13T12:55:00Z
2
value 0.00821
scoring_system epss
scoring_elements 0.7439
published_at 2026-04-04T12:55:00Z
3
value 0.00821
scoring_system epss
scoring_elements 0.74364
published_at 2026-04-07T12:55:00Z
4
value 0.00821
scoring_system epss
scoring_elements 0.74397
published_at 2026-04-08T12:55:00Z
5
value 0.00821
scoring_system epss
scoring_elements 0.74412
published_at 2026-04-09T12:55:00Z
6
value 0.00821
scoring_system epss
scoring_elements 0.74433
published_at 2026-04-11T12:55:00Z
7
value 0.00821
scoring_system epss
scoring_elements 0.74413
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357917
reference_id 2357917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357917
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-24216
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cw56-pdyr-fbge
12
url VCID-hvj6-wsg9-1bhg
vulnerability_id VCID-hvj6-wsg9-1bhg
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43265
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04829
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.0543
published_at 2026-04-13T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05414
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05422
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05457
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05478
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.0545
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05436
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43265
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386276
reference_id 2386276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386276
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-43265
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvj6-wsg9-1bhg
13
url VCID-ky87-8zpf-nqg2
vulnerability_id VCID-ky87-8zpf-nqg2
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30427
reference_id
reference_type
scores
0
value 0.01119
scoring_system epss
scoring_elements 0.78181
published_at 2026-04-02T12:55:00Z
1
value 0.01119
scoring_system epss
scoring_elements 0.7823
published_at 2026-04-13T12:55:00Z
2
value 0.01119
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-04T12:55:00Z
3
value 0.01119
scoring_system epss
scoring_elements 0.78194
published_at 2026-04-07T12:55:00Z
4
value 0.01119
scoring_system epss
scoring_elements 0.7822
published_at 2026-04-08T12:55:00Z
5
value 0.01119
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-09T12:55:00Z
6
value 0.01119
scoring_system epss
scoring_elements 0.78252
published_at 2026-04-11T12:55:00Z
7
value 0.01119
scoring_system epss
scoring_elements 0.78234
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357919
reference_id 2357919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357919
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-30427
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ky87-8zpf-nqg2
14
url VCID-mch4-qacj-f7ey
vulnerability_id VCID-mch4-qacj-f7ey
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44192
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40741
published_at 2026-04-11T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40715
published_at 2026-04-02T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40717
published_at 2026-04-08T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40667
published_at 2026-04-07T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40743
published_at 2026-04-04T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40723
published_at 2026-04-09T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43342
published_at 2026-04-13T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43358
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353871
reference_id 2353871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353871
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2024-44192
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mch4-qacj-f7ey
15
url VCID-n7w5-dz8n-mbht
vulnerability_id VCID-n7w5-dz8n-mbht
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44244
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51323
published_at 2026-04-13T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51277
published_at 2026-04-02T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51302
published_at 2026-04-04T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51262
published_at 2026-04-07T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-08T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51314
published_at 2026-04-09T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51357
published_at 2026-04-11T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51336
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121563
reference_id 121563
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121563
5
reference_url https://support.apple.com/en-us/121564
reference_id 121564
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121564
6
reference_url https://support.apple.com/en-us/121565
reference_id 121565
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121565
7
reference_url https://support.apple.com/en-us/121566
reference_id 121566
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121566
8
reference_url https://support.apple.com/en-us/121569
reference_id 121569
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121569
9
reference_url https://support.apple.com/en-us/121571
reference_id 121571
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121571
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323278
reference_id 2323278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323278
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:9545
reference_id RHSA-2024:9545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9545
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2024:9637
reference_id RHSA-2024:9637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9637
16
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7113-1/
reference_id USN-7113-1
reference_type
scores
url https://usn.ubuntu.com/7113-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2024-44244
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w5-dz8n-mbht
16
url VCID-nu9v-3xak-77aw
vulnerability_id VCID-nu9v-3xak-77aw
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43240
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08273
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09114
published_at 2026-04-13T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0913
published_at 2026-04-08T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.0905
published_at 2026-04-07T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09161
published_at 2026-04-11T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09128
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/
url https://support.apple.com/en-us/124149
5
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/
url https://support.apple.com/en-us/124152
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2384385
reference_id 2384385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2384385
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
9
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
10
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
11
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
12
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
13
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
14
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
15
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
16
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
17
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
18
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-43240
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nu9v-3xak-77aw
17
url VCID-p84d-5ze6-9fb5
vulnerability_id VCID-p84d-5ze6-9fb5
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43228
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.1092
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12046
published_at 2026-04-13T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.11971
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12053
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12105
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12112
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12075
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.1217
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43228
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/
url https://support.apple.com/en-us/124152
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386275
reference_id 2386275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386275
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-43228
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p84d-5ze6-9fb5
18
url VCID-pyek-9fpp-nudy
vulnerability_id VCID-pyek-9fpp-nudy
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40866
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25506
published_at 2026-04-13T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25472
published_at 2026-04-07T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25546
published_at 2026-04-08T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25594
published_at 2026-04-09T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25604
published_at 2026-04-11T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25563
published_at 2026-04-12T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25663
published_at 2026-04-02T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25704
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40866
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/
url https://support.apple.com/en-us/121241
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2312724
reference_id 2312724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2312724
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
9
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
10
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://usn.ubuntu.com/7079-1/
reference_id USN-7079-1
reference_type
scores
url https://usn.ubuntu.com/7079-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2024-40866
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyek-9fpp-nudy
19
url VCID-r857-ke39-xug8
vulnerability_id VCID-r857-ke39-xug8
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43227
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32854
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34644
published_at 2026-04-13T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34755
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34632
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34676
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34704
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34707
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34668
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43227
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386274
reference_id 2386274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386274
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-43227
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r857-ke39-xug8
20
url VCID-rj9q-8rw3-qbbn
vulnerability_id VCID-rj9q-8rw3-qbbn
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24264
reference_id
reference_type
scores
0
value 0.01384
scoring_system epss
scoring_elements 0.80265
published_at 2026-04-02T12:55:00Z
1
value 0.01384
scoring_system epss
scoring_elements 0.8031
published_at 2026-04-13T12:55:00Z
2
value 0.01384
scoring_system epss
scoring_elements 0.80286
published_at 2026-04-04T12:55:00Z
3
value 0.01384
scoring_system epss
scoring_elements 0.80274
published_at 2026-04-07T12:55:00Z
4
value 0.01384
scoring_system epss
scoring_elements 0.80302
published_at 2026-04-08T12:55:00Z
5
value 0.01384
scoring_system epss
scoring_elements 0.80313
published_at 2026-04-09T12:55:00Z
6
value 0.01384
scoring_system epss
scoring_elements 0.80331
published_at 2026-04-11T12:55:00Z
7
value 0.01384
scoring_system epss
scoring_elements 0.80316
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24264
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357918
reference_id 2357918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357918
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
13
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
14
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
15
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
16
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
17
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-24264
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9q-8rw3-qbbn
21
url VCID-u9g4-5f16-yqc9
vulnerability_id VCID-u9g4-5f16-yqc9
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24209
reference_id
reference_type
scores
0
value 0.02557
scoring_system epss
scoring_elements 0.85507
published_at 2026-04-13T12:55:00Z
1
value 0.02557
scoring_system epss
scoring_elements 0.85465
published_at 2026-04-04T12:55:00Z
2
value 0.02557
scoring_system epss
scoring_elements 0.85468
published_at 2026-04-07T12:55:00Z
3
value 0.02557
scoring_system epss
scoring_elements 0.85489
published_at 2026-04-08T12:55:00Z
4
value 0.02557
scoring_system epss
scoring_elements 0.85497
published_at 2026-04-09T12:55:00Z
5
value 0.02557
scoring_system epss
scoring_elements 0.85512
published_at 2026-04-11T12:55:00Z
6
value 0.02557
scoring_system epss
scoring_elements 0.8551
published_at 2026-04-12T12:55:00Z
7
value 0.03379
scoring_system epss
scoring_elements 0.87339
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122376
reference_id 122376
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122376
8
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122377
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357911
reference_id 2357911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357911
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-24209
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9g4-5f16-yqc9
22
url VCID-uu3f-t2ps-gbhd
vulnerability_id VCID-uu3f-t2ps-gbhd
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40857.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40857.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40857
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35775
published_at 2026-04-13T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35898
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35928
published_at 2026-04-04T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35759
published_at 2026-04-07T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35809
published_at 2026-04-08T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35831
published_at 2026-04-09T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35839
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35798
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40857
2
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T15:11:25Z/
url https://support.apple.com/en-us/121238
3
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T15:11:25Z/
url https://support.apple.com/en-us/121240
4
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T15:11:25Z/
url https://support.apple.com/en-us/121241
5
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T15:11:25Z/
url https://support.apple.com/en-us/121248
6
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T15:11:25Z/
url https://support.apple.com/en-us/121249
7
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T15:11:25Z/
url https://support.apple.com/en-us/121250
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314705
reference_id 2314705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314705
9
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2024-40857
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uu3f-t2ps-gbhd
23
url VCID-wnxh-854z-ykfk
vulnerability_id VCID-wnxh-854z-ykfk
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43211
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05046
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04925
published_at 2026-04-13T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.0491
published_at 2026-04-04T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.04929
published_at 2026-04-07T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.04965
published_at 2026-04-08T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04981
published_at 2026-04-09T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.04963
published_at 2026-04-11T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386270
reference_id 2386270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386270
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-43211
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxh-854z-ykfk
24
url VCID-yg6b-hsst-ckaa
vulnerability_id VCID-yg6b-hsst-ckaa
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31278
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.2663
published_at 2026-04-02T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28519
published_at 2026-04-13T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28699
published_at 2026-04-04T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28505
published_at 2026-04-07T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28569
published_at 2026-04-08T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.2861
published_at 2026-04-09T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28612
published_at 2026-04-11T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28568
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31278
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386269
reference_id 2386269
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386269
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.48.5
purl pkg:ebuild/net-libs/webkit-gtk@2.48.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5
aliases CVE-2025-31278
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6b-hsst-ckaa
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.48.5